ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ Û±±±±±±±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±±±±±±±Û Û²²²²²²²|\_______________________________________________________________/|²²²²²²²Û Û²²²²²²²||\_____________________________________________________________/||²²²²²²²Û Û²²²²²²²||| __ ____ __ __ |||²²²²²²²Û Û²²²²²²²||| /\ \__/\ _`\ ---The E-Zine--- /\ \/\ \ |||²²²²²²²Û Û²²²²²²²||| ___ __ _\ \ ,_\ \ \L\ \ _ __ __ __ \ \ \/'/' |||²²²²²²²Û Û²²²²²²²||| / __`\/\ \/\ \ \ \/\ \ _ <_/\`'__Y'__`\ /'__`\\ \ , < |||²²²²²²²Û Û²²²²²²²||| /\ \L\ \ \ \_\ \ \ \_\ \ \L\ \ \ \/\ __//\ \L\.\\ \ \\`\ |||²²²²²²²Û Û²²²²²²²||| \ \____/\ \____/\ \__\\ \____/\ \_\ \____\ \__/.\_\ \_\ \_\ |||²²²²²²²Û Û²²²²²²²||| \____/ \/___/ \/__/ \/___/ \/_/\/____/\/__/\/_/\/_/\/_/ |||²²²²²²²Û Û²²²²²²²|||_____________________________________________________________|||²²²²²²²Û Û²²²²²²²||/_____________________________________________________________\||²²²²²²²Û Û²²²²²²²|/_______________________________________________________________\|±±±±±±±Û Û±±±±±±±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ`amatierÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ Outbreak Magazine Issue #5 May 2002 Release "Say, wanna dress up like penguins and play with lincoln logs?" - Chris GinSing Editorial: Hey kids. Welcome to Outbreak #5. In this issue we will provide you with toilet humor, and some geeky knowledge. And maybe a little bit of both together in one text. Who knows, you're gonna have to read the damn issue to find out. Maybe if you're lucky you'll find some ascii porn. Remember, Outbreak is a free speech e-zine. So if you happen to read something that you don't like, or that you disagree with. Then write a rebuttle to it and submit it to me. You can have your say to. Enjoy issue #5. And if you happen to have any articles that you wrote send them our way. Send all texts to: kleptic@outbreakzine.net Enjoy! - kleptic Û°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°Staff°²²²ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°Û ð ð kleptic............... ð ð fwaggle............... ð ð `amatier.............. ð ð antimatt3r............ ð ð Strykar............... ð ð Prodigal|Son.......... ð ð Ryan.................. ð ð Radioactive_Raindeer.. ð ð timeless.............. ð ð `Enigma............... ð ð dropcode.............. ð ð [encrypted]........... ð ð Turbanator............ð ð ð Û°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°ððððð°²²²ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°Û Shout Outs: All @ #hackerzlair on irc.dal.net, RBCP at phonelosers.org, scene.textfiles.com, diegeekdie.org, hackerzlair.org, fwaggle.net, dsinet.org, ameriphreak.com, surviveall.net, roy.phonelosers.org, #outbreakzine on irc.dal.net, guruworld.org, Everyone that helped out with this issue of Outbreak. You all rule! ÜßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßÜ \-Û www.outbreakzine.net Û-/ ßÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜß Vist Us @ IRC.DAL.NET Join #outbreakzine Send all articles for submission to: kleptic@outbreakzine.net ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛðÛÛÛÛÛÛðÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ Ý Outbreak Issue #5 Þ Ý ÜÜ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÜÜÜ Þ Ý Ý Þ Þ Ý Ý [ 0] Editorial...............................kleptic Þ Þ Ý [ 1] Welcome to Mianus.......................#Mianus Þ Ý [ 2] Spyware.................................`Enigma Þ Ý [ 3] Console Wars Sux0r......................Ryan Þ Ý [ 4] Sweet Eyebrow Lovin'....................kleptic Þ Ý [ 5] A Guide to C/C++ Programming Part 2.....Radioactive_Raindeer Þ Ý [ 6] PRE-dystopia............................dropcode Þ Ý [ 7] Cryptoanalysis of an Affine Cipher......[encrypted] Þ Ý [ 8] the Swimsuit Edition Text...............Outbreak Staff Þ Ý [ 9] A Sign of Weakness......................dropcode Þ Ý [10] Getting Free Linux Distros..............Turbanator Þ Ý [11] The anTrojan Filez 4....................Timeless Þ Ý [12] Step by Step (SxS) Switching Notes......antimatt3r Þ Ý [13] Conclusion..............................Outbreak Staff Þ ÜÜ ÜÜ ÜÜÜÝ ÞÜÜÜ ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ -°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°ð-|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°- +-+-+-+-+-+-+-+-+ ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij All information provided in official OutBreak Zine, Web sites is provided for.... information purposes only and does not constitute a legal contract between the.... Editors or Writers and any person or entity unless otherwise specified............ Information on official OutBreak Zine web sites is subject to change without...... prior notice. Although every reasonable effort is made to present current and..... accurate information, the Editors and Writers make no guarantees of any kind...... The OutBreak web site may contain information that is created and maintained by a variety of sources both internal and external to the Staff. These sites are.. unmoderated containing the personal opinions and other expressions of the persons. who post the entries. OutBreak does not control, monitor or guarantee.... the information contained in these sites or information contained in links to other external web sites, and does not endorse any views expressed or products or....... services offered therein. In no event shall OutBreak be responsible or... liable, directly or indirectly, for any damage or loss caused or alleged to be.... caused by or in connection with the use of or reliance on any such content, goods, or services available on or through any such site or resource..................... Any links to external Web sites and/or non-OutBreak information provided on...... OutBreak pages or returned from Any Web search engines are provided as a.......... courtesy. They should not be construed as an endorsement by OutBreak and.......... of the content or views of the linked materials................................... COPYRIGHT AND LIMITATIONS ON USE : OutBreak Contents may not be used with out express written permission........ By the Editor..........kleptic@outbreakzine.net................................. COPYRIGHT©® 2002. ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 1 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij Session Start: Fri Apr 19 15:58:53 2002 Session Ident: #mianus [3:58:53] *** Now talking in #mianus [3:58:53] *** Topic is ' figures you dicks would be canadian' [3:58:53] *** Set by Dominique on Fri Apr 19 01:54:51 [3:59:01] they hate a lot of people in mianus [3:59:04] *** `Enigma (~3nigm4@168.103.160.68) has joined #mianus [3:59:07] minanus must be a hateful place [3:59:08] i suppose they don't like ppl in mianus. [3:59:13] a dark and smelly place [3:59:18] lol [3:59:22] ok why is every one talking so damn funney [3:59:25] did i miss somthing [3:59:32] minanus must be a hateful place [3:59:33] acid: mianus is a town. [3:59:34] your in mianus [3:59:35] what are you talking about? [3:59:36] they hate a lot of people in mianus [3:59:39] lots of ppl in mianus. [3:59:42] we're in mianus [3:59:43] geez [3:59:46] you're sick mind [3:59:48] dude we need to have a real elite irc chat [3:59:55] I just told my friend were chatting in mianus [4:00:02] well we are [4:00:06] mianus is the shit! [4:00:06] ha so mianus is a town where? [4:00:07] "so what did you do today" [4:00:11] "hung out in mianus" [4:00:20] i <3 mianus [4:00:31] ir in mianus [4:00:41] mianus is a city in onterio, canada [4:00:48] prodigal. [4:00:49] when I'm bored I like to go to #mianus [4:00:50] join like #a;orijf4pq;alfij;awoiejflafjlak that is elite [4:00:52] no its not in ontario. [4:01:00] where? [4:01:00] its in america. [4:01:07] i forget where tho... [4:01:14] its in pound mi anus [4:01:14] i was looking at a map of mianus the other day. [4:01:20] b.c? [4:01:26] no US. [4:01:27] help [4:01:28] dropcode: i got a plan [4:01:28] I'm lost [4:01:30] in mianus [4:01:43] do they drill in mianus? [4:01:55] lets hope not :) [4:01:58] and what do they drive in mianus? [4:02:00] dood... they do everything in mianus. [4:02:02] they struck oil in mianus [4:02:12] dood... you're getting mianus [4:02:21] mianus is a hot spot for everythin that is cool [4:02:31] <`Enigma> i rode a bus through mianus once [4:02:33] they have partys like you wouldnt believe in mianus [4:02:35] there's a party in mianus and everyone is invited [4:02:42] hey you want an 31337 channel? [4:02:48] isn't mianus pretty tight? [4:02:49] everyone and there dead dog is invited to the shindigs in mianus [4:02:53] it is PS [4:02:58] mianus is tight as fuck [4:03:04] its off the hook [4:03:08] spell 31337 in bianary that woukld be leet [4:03:18] spell is in hex [4:03:22] it [4:03:49] dude, I knew a guy named Richard that lived in mianus [4:03:59] actually he lived out side of mianus [4:04:03] did they call him dick? [4:04:03] but he would commute everyday [4:04:09] I don't know about that [4:04:13] Richard of mianus is what he was called [4:04:17] yeah [4:04:31] or for short Dick of mianus [4:04:33] ya see. he canned beets in mianus [4:04:35] at the corner store [4:04:40] over by the gas station [4:04:43] like richard nixon was called "tricky dick" and dick is a nick for richard [4:04:44] so dick the beet canner of mianus [4:04:57] <`Enigma> i dont like beets from mianus [4:05:10] well. Dick liked to can his beets in mianus [4:05:14] that's all I have to say about that [4:05:16] i thought he caned cucombers [4:05:21] * antimatt3r has returned, [gone/??] [4:05:24] dood. i dunno... i bet they're awesome at pickling stuff in mianus. [4:05:25] maybe he bett his cans [4:05:27] not sure [4:05:27] ah look I'm back in mianus! [4:05:28] it was a while ago [4:05:33] *** proksy (kfj@oh.fo-sho.org) has left #mianus [4:05:51] *** gambiit (fbkdfk@1Cust32.tnt4.minneapolis.mn.da.uu.net) Quit (Quit: Killed (stats.dal.net (User has been banned from DALnet for life ([exp/fldhst] Exploited host, go to http://kline.dal.net/exploits/akills.htm) [AKILL ID:101725682309K-b])) hes a fucking leet badass mothafucka') [4:05:53] they have a school in mianus [4:06:00] a big one? [4:06:14] probably not so big [4:06:16] mianus is pretty small [4:06:18] OMG! gambiit got killed in mianus! [4:06:45] were leaving mianus Session Close: Fri Apr 19 16:06:53 2002 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 2 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij --=Spyware=-- -by `Enigma- --------------------------- What is Spyware? --------------------------- Have you ever downloaded free software such as a game or a file sharing program? If you have there is a very good chance that spyware was installed in the background. Spyware is software that sneaks its way onto your system to track your every move and report its findings back to the software's creator without the users knowledge. This information is then used for advertising purposes. Spyware applications are usually hidden in free software that you download off the internet. Lots of free software such as Kazaa and Imesh are known to install some form of spyware. Spyware is very common on Windows computers and sadly most people don't know their privacy is being invaded. At the same time spyware infected programs use your internet connection to download ads they also upload information about your computer. Several freeware applications have been know to upload very personal information about the users system, such as browser history. In addition to stealing your privacy, spyware is an executable program on your system capable of doing anything. These programs can monitor keystrokes, read cookies and even scan files on your hard drive. All data that is gathered by the spyware program can be used by the spyware's author for marketing purposes or sold for profit. Have no fear! you will no longer have to worry about your privacy being stolen from you. The first step in keeping your privacy is to find out if you currently have spyware applications installed on your system. To do this you will need a spyware removal program such as Ad-aware. Ad-aware will help you to detect and remove any unwanted spyware programs. You should also have some sort of personal firewall to help you monitor all outbound internet traffic. Also do a little research on the free software you are installing to find out if it is known to have spyware. That is really all it takes to keep your system spyware free. So, if you don't like people snooping around your computer and stealing personal information stay up to date on spyware. Each day these programs get more sophisticated and become capable of causing even more havoc on your computer systems. --------------------------- Infected Programs --------------------------- Here is a very short list of some common programs that have tested positive for spyware. iMesh 2.20 beta BearShare 2.40 Cute FTP 3.0 Go!Zilla 3.5 KaZaA (all since early feb. 2002) Limewire Media Player (suspect) Morpheus 1.3 Preview Edition Netscape 6.x Opera 5 ProtectX 3 ProxyChecker RealPlayer 7 and 8 WinXP Search Assistant More programs with spyware: http://www.tom-cat.com/spybase/spylist.html --------------------------- Other Spyware Related Links --------------------------- http://www.spychecker.com/ http://www.anti-spy.com/ http://www.lavasoftusa.com/downloads.html (AdAware download page) ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 3 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij This article is basically just to tell my view on all of this console warring that is going on amongst everyone. I am talking about how people with a gamecube might say "oh my console is the best!" and then a ps2 player will be like "gamecube players smell like something that passed through the bowls of a sick old woman!" First off consoles are like Linux distro's, there is no one distro that is better than another, it is all a matter of what you want. Say you want to have a clean distro with no bells and whistles but it works well then you would get Slackware. However if you are a newbie and want lots of software you would probably want Mandrake. Same goes for consoles, it is all a matter of taste. Each platform has different aspects that appeal to different people, I will explain what each console has to offer and what type of person would most likely enjoy that console. Playstation 2: Well I deffinatly cannot dis this system in any way, nor can anyone else just due to the sheer fact that it does have many very good games, and just a lot of games in general. The games this system is known for is RPG's, if you are into RPG's I would suggest this console. However that is not to say that other consoles won't have great RPG's, such as the Xbox, but I will get into that later. I would have to say Playstation 2 is also best for people with no friends. I am not saying that PS2 doesn't have some good multiplayer games, I am just saying it doesn't have a lot to choose from. XBox: The thing I see people say most about the xbox is "its a Microsoft product! Fight the power!" or something to that affect. However that is just something an idiot would say. How can you base the console you purchase on who makes it? I could understand this if say you were thinking of buying something made by Nike as opposed to buying something made by Reebok, due to the fact that Nike has little kids make there stuff in sweat shops which is simply inhuman. Yet, Microsoft (as evil as they may be) does do anything bad human rights wise, they just make a product. This product just being the console which you play the games on. These games are not always made by Microsoft, they are usually made by 3rd party developers who, some of us, have purchased games from for years. Now onto who should buy a Xbox. I have found that Xbox already has a ton of multiplayer games that have a unbelievably high replay value. Also, the Xbox is coming out with some RPG's which have been talked about like they will revolutionize the genre. So if you are looking for a system with few RPG's but the RPG's that are coming out will be phenomenal I would go with the XBox. Also, if you have a lot of friends I would also go with the Xbox, because LAN parties rock! Gamecube: What can I say! I have this console and despite wanting to keep my mouth shut I just cannot, I do not like this console, I have played nearly every game out for the system and it is terrible. I might would like it if I was 5, but I am an adult now and I simply cannot have fun when playing these games. To put it in perspective, my sister even thinks all the games are childish and boring, even games that are suppose to be the best out on the system such as Star Wars: Rogue Leader. Seeing as how I do own this console and I say it is awful my opinion is not bias, so make a note of that you potentials flamers. Well.... I would only suggest this console for people who are to rich for there own good and want every new system, or 5 year olds who like to kill things with a flash light and a vacuum cleaner. Oh yeah and if you have any comments about this that are positive feel free to send them, if not then don't contact me at all because you are probably lame. - Ryan (ryan@insidergaming.net) ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 4 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij Sweet Eyebrow Lovin' -------------------- by Kleptic (kleptic@outbreakzine.net) Shortly after becoming a Real Man (a "Real Man" being defined as a boy who grows hair in places other than his head including, but not limited to, his chest, chin, upper lip, belly button, back, booty, feet, peepee and cajones, nips, taint, dooberwhacker, and spreklepouch), I gradually became aware of an exceedingly strange phenomenon beginning to happen right in front of my eyes, or more specifically, right above my eyes. My left eyebrow seemed to have decided that it would be happier on the right side of my face, with the other one. Operation Grow Across the Gap and Make Sweet Eyebrow Love was in full effect. Now, there aren't many things in this world much worse than eyebrows in love. Don't get me wrong, I'm all for love and sunshine and happiness and true love and women with hairy armpits, no bras, and Joanie Mitchell records, but I draw the line at eyebrow love. Why, you ask? Why not just let them be So Happy Together? I'll tell you why. Stage one of eyebrow love: The Herman Munster. The Herman Munster occurs when the two eyebrows succeed in making contact with each other, and their slow mating process commences. The problem with how to permanently prevent this from happening is mankind's last great challenge, and not one to be taken lightly. I suspect we have been bypassed by several alien civilizations seeking galactic comraderie due to this disability. "Ooh, Xqorgonak, look! This planet is intelligent! They have aircrafts, lasers, skyscrapers, Dairy Queen, and... wait a second... what's that on that guy's face? Crap. That's a unibrow, isn't it? I knew this place was too good to be true. I guess we'll just have to take the Fantastically Amazing Machine of Ultimate Happiness, Posterity, Actually Understanding Girls, and Never, Ever Pooping Your Pants After Your Fourth Birthday to some other, more civilized planet." Stage two of eyebrow love: The Man's Man. A Real Man becomes a Man's Man when the female eyebrow gives birth to it's first litter of babies. These cute little tufts of hair eagerly migrate around the Man's Man's body, filling a far less orthodox range of brow positions: nostril-brow, tooth-brow, finger-brow, and the hilarious-looking eyebrow-brow. Some people seem to consider the Man's Man to be a glorious testament to all that is masculine, but I find that only other Men's Men or Men's Men-In-Training truly hold them in high regard. Sure, the guy can wrastle grizzlies like a mofo, but with that much hair all over his shoulders, forehead, tongue, teeth, eyelids, and God-knows-where-else, he will never achieve the much more desirable position of Ladies Man, wink wink, nudge nudge. NOTE TO MALE READERS ONLY: Chicks dig guys who pluck their unibrows... and tell them about it. Trust me, it works. They'll think you have common sense and they'll want to smooch you and stroke the smooth spot between your eyebrows all night long. NOTE TO FEMALE READERS ONLY: I know you just read the note to male readers only, you cheaters. I saw you do it. The third and final stage of eyebrow love: The Gorilla. What do you really know about gorillas?They're big monkeys? They're a primitive species? Try again. They're just regular guys, like you and me (but not my Uncle Mike 'cause he eats SPAMwiches and that's really weird), except they let their unibrows get entirely out of hand. Really. You think they're begging for peanuts at the zoo? Well, let me tell you, "ooh ooh, ah ah" in gorilla-talk means "Give me some tweezers! I'm a man, I tell you, not an ape! If you'll just give me some freakin' tweezers I'll show you! Yes... yes... he's digging in his pockets! ...NO! Damn you! I don't want your peanuts! I want to pluck my unibrow! Wait, don't go! Okay, okay, I'll take the peanuts... heh, sucker... Hey, bring honey roasted next time!" And that about wraps it up. I kind of forgot what I was talking about. I guess the moral of the story would be... er... don't give monkeys tweezers because they'll pull all their hair out and turn into naked men and that's probably really freaky to see. ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 5 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij Radioactive_Raindeers guide to C/C++ programming. Part 2 - More basics. Hello again all you newbie code poets. Welcome to part 2 of this guide. In this issye we will start off with the variable stuff I promised I'd talk about. And maybe a bit more about functions. I haven't really decided yet. I'll just stop here. Introductions are crap and I think you'd rather read the actual guide. As you may remember we have our basic variable types; int, char and float. Now, you may have thought about how large numbers you can store in an int or how to store strings of text. Actually, there are several integer variables and a couple of float-type variables. I'll list them here with what the specifications say about the sizes. Integer type variables. short A short has to be at least 2 bytes. int An int has to be at least as large as short long A long is at least 4 bytes and cannot be smaller than an int. The usual sizes on short and long are 2 and 4 respectively. Int can be either. An integer type variable can alos be signed/unsigned. A signed variable can hold both positive and negative variables. An unsigned variable can only hold positive numbers. You can do something like this to get the integer type varible sizes on your system: <---- code start ----> #include int main(void) cout << "int is " << sizeof(int) << " bytes.\n"; cout << "short is " << sizeof(short) << " bytes.\n"; cout << "long is " << sizeof(long) << " bytes.\n"; return 0; <----- code end -----> Float type variables. float Has to be at least 4 bytes. double Has to be at least 6 bytes and can't be smaller than float. long double Has to be at least as large as double. These are usually 4, 8 and 10 bytes. To get the sizes on your system try modifying the above example. It's not that hard. Chars and arrays. A char is a variable type that can only hold a single character. Not a lot to say about it really and it's quite useless by itself if you ask me. However, if you use an array of chars you can use them like you'd use string variables in other programming languages. So what is an array? The easy answer would be that it's a variable type that stores a load of variables. That doesn't tell the whole story though. If you think of a variable as a box (like a shoebox or something) that you put numbers and characters and stuff like that in. Then an array is like a shelf that holds those boxes. Let's say we wanted to store the string "foobar" then we'd use the following code: char blah[7] = "foobar"; The 7 in there tells the compiler that we want 7 elements in our array. That's 6 for the text and 1 for a null at the end which signifies the end of the string. But we can also leave the number out like this: char blah[] = "foobar"; This makes the compiler do the counting for us. A really nice feature if you're using really long strings. Let's see what this looks like with a nice diagram. Index -> | 0 | 1 | 2 | 3 | 4 | 5 | 6 | Content -> | f | o | o | b | a | r | \0 | Note that the index starts at 0 for the first element. Let's change our array a bit. blah[5] = 'f'; // Use single quotes with characters. Double quotes with strings. This makes our array look like this: Index -> | 0 | 1 | 2 | 3 | 4 | 5 | 6 | Content -> | f | o | o | b | a | f | \0 | This is something most books on C teaches. I've only found one good use for this though. And that's replacing a character with \0, the null symbol. blah[3] = '\0'; Now the array looks like this: Index -> | 0 | 1 | 2 | 3 | 4 | 5 | 6 | Content -> | f | o | o | \0 | a | f | \0 | The nice thing about this comes in when we print it. cout << blah << "\n"; And we get "foo" printed on our screen. Neat, eh? Yeah, I know. Still boring... Anyway, back to the guide. Like I said earlier, \0 represents the end of a string. So the program stops reading the string when it finds a \0. You should also know that the index number doesn't have to be a constant. You can use an integer to choose the element you want to access. Time for another boring code example. #include #include // This is here because we want to use the strlen() function int main(void) char blah[] = "foobar"; // creating our string. for (int i = strlen(blah); i > 0; i--) blah[i] = '\0'; cout << blah << "\n"; return 0; There are two new things in this code example. The first one is the for loop and the second is the calling of strlen(). If we were to look in the header file string.h we would probably find that strlen() is a funtion that accepts an array of chars as argument and returns an integer. What we are doing here is sending the content of our variable named blah to that function. It counts the number of characters in the array and returns an integer containing the number. A for loop is a really useful piece of code. It executes the code inside the curly brackets several time. The actual number depends on what arguments we give to the loop. It takes three arguments separated by semicolons. The first argument (int i = strlen(blah) in the example) sets the initial value of the count variable. In our case it sets it to the lenght of the string. The second argument is the test condition (i > 0) which tells the loop when it should execute. Here we told it that it should execute when it contains a value greater than 0. The third argument (i--) tells the loop what to do at the end of each execution. Here we told it to decrease i by one. Just a quick summary of how this loop works: It gets the lenght of the string and puts it in i. It then checks if it passes the check. (if i is greater than 0) Since i is 6 it does. It then executes the code. Then it executes it's third argument which decreases i by one. Then it goes back to the second step and checks if i is greater than 0. And so on... When the condition is no longer met the code procedes as usual. In this example return 0 is executed and returns control to the operating system. That's it for part 2. I haven't decided what will be in part 3 yet so you'll just have to wait and see. Happy coding! / Radioactive_Raindeer r_r@diegeekdie.org ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 6 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij ###################################################################### ## [PRE-dystopia -dropcode] ## ## there's no such thing as paranoia... just damn good thinkin' ## ###################################################################### ---------------------------------------------------------------------- :: disclaimer :: withdrawal of responsibility ---------------------------------------------------------------------- i hereby disclaim all liability to, and warn all readers of, the perils this text may inflict upon its readers. the purpose and main function of a Government is to maintain social and economical stability within their society. in order for this to occur they must self-perpetuate at the cost of anything but there objectives. the path to social stability is often littered with means that would be more than frowned upon by society if they could only see it in clearer light. however, if a few individuals began noticing the elements of stabalization deeply embedded into everyday life, they would be a threat to the self-perpetuating power structure that is our Government. and the elimination of a few individuals is an infinitesimal perplexity in the grand scheme of political evolution. nonetheless, i pray you understand that the notions expressed herein are important and should be made as big as they can be. and lest we perish, our legacy will forever be. ---------------------------------------------------------------------- :: explanation :: wtf? ---------------------------------------------------------------------- it's been a prevailing and repetitive scenario dating back hundreds of thousands of years. societies reigned over by the highest caste of the social hierarchy. as far as history can tell, people have always followed leaders. society has always had standards to split up people into different catagories; knowns and unknowns, haves and havenots. but who sets these standards? who determines, by what perogative, who has and who has not? i can already hear the legions of readers echoing, 'the individual...dual...ual...al...l...' well, i'm here to tell you, friends: that is not entirely true. this text will explain that Governments, as the ruling caste, have and have had but two objectives: civilize and stabilize... at any cost. even the cost of our civil liberties. as i am not duly equiped to explain these concepts to there fullest, i suggest those who are interested read George Orwell's 1984, Aldous Huxley's Brave New World and Brave New World Revisited, Ray Bradbury's Fahrenheit 451, Eugene Zamiatin's We and any other books in the dystopian genre that you can find. ---------------------------------------------------------------------- :: american truths :: sharp contrasts ---------------------------------------------------------------------- when the Taliban attacks america, that is terrorism. when america attacks the Taliban, that is retaliation. when the Taliban responds with further attacks on our great nation, they are terrorizing again. when we respond with further attacks on their nation, we're retaliating again. if you make a fuss over civilian casualties caused by the american government, you are aiding in the dissemination of terrorist propaganda. however, when civilians are killed by haters of our mighty nation, the perpetrators are evil and those deaths are tragedies. When they put bombs in cars and kill our people, they're uncivilized killers. When we put bombs on missiles and kill their people, we're upholding civilized values. When they kill, they're terrorists. When we kill, we're striking against terror. ---------------------------------------------------------------------- :: osama bin laden :: a beacon for animosity ---------------------------------------------------------------------- in the 80's, osama bin laden was a ruthless killer. he led attacks against the soviets in an attempt to force them out of afghanistan. the united states were a beneficiary of the war between osama's followers and the soviet occupiers of afghanistan so america aided osama's army with munitions and training. in the all american opinion, osama was good. in 2001, osama bin laden was a ruthless killer. thousands of american citizens were murdered in cold blood at the hands of osama's zealous, fanatic following. in the all american opinion, osama is evil. in order for a civilization to exist, survive and prosper there must be an organized stability of society. in order for this to be achieved the ruling caste must hold a certain amount of control over the people. in a society where the doctrines of the government are declared and understood as democratic, the masses have a sense of security in knowing that they have a voice, and they play a part. the frightening truth is, osama is whatever our loving leader says he is. ---------------------------------------------------------------------- the american government declared this war and bush has described it as intemporal without geographical bounds. and i fear. greets.........gr3p.rambo.ex.klep.lexi.jennie.digi.smiley.anti.adeamis ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 7 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij Cryptoanalysis of an affine cipher ---------------------------------- by: Encrypted The objective of cryptoanalysis is to "crack the code", ex. - to recover the plaintext from the ciphertext, and also to find which key was used. I will discuss some methods of cryptoanalysis. Understanding the methods of cryptoanalysis is important not only for the cipher breaker "alpha", but also for the cipher users "bravo" and "charlie", since they want to make sure that their communication is reasonably secure. The Kerckhoff's Principle. The Kerckhoff's Principle is the general assumption that the opponent, Alpha", knows which cryptosystem is being used. There are different levels of attacks on a cryptosystem. Ciphertext-only attack. We are assuming the opponent possesses a string of ciphertexts Known plaintext. The opponent possesses a string of plaintexts, and the corresponding string of ciphertexts. Chosen plaintext. The opponent has a temporary access to the encryption machinery, so that he can choose a plaintext string and construct the corresponding ciphertext string. The weakest type of attacts is the ciphertext-only attack. If the keyspace of the cryptosystem is small, then the method of exhaustive search can be applied. In the case of a large keyspace, there exist other methods which are based on the statistical properties of languages. Statistical properties of the English. We assume that plaintext and cyphertext characters are characters of the English alphabet, and that the plaintext is an ordinary English text. Frequency of appearance of a character. The English characters do not appear in ordinary texts with the same frequency. People have estimated relative frequencies of the 26 English characters by compiling statistics from books, magazines. Below is a table I found somewhere on the net. I didnt make it im not that smart. A B C D E F G H I J K L M .082 .015 .028 .043 .127 .022 .020 .061 .070 .002 .008 .040 .024 N O P Q R S T U V W X Y Z .067 .075 .019 .001 .060 .063 .091 .028 .010 .023 .001 .020 .001 Probability of occurence (i hope that iz worded right. heh) 1. E ( probability .127). 2. T,A, O, I, N, S, H, R ( probability between 0.06 and 0.09). 3. D, L (probability around 0.04). 4. C,U, M, W, F, G, Y, P, B (probability between 0.015 and 0.023). 5. V,K,J,X,Q,Z ( probability less than 0.01). There are also combinations of two and three letters, called digrams and trigrams, that are frenquently met. In decreasing order, the most common digrams and trigrams are: TH HE IN ER AN RE ED ON ES ST EN AT TO NT HA ND OU EA NG AS OR TI IS ET IT AR TE SE HI OF THE ING AND HER ERE ENT THA NTH WAS ETH FOR DTH These statistical properties can be used effectively for attacks on ciphers having a relatively large keyspace. Cryptoanalysis of the Affine Cipher An example of cryptanalysis of an affine cipher. Suppose the ciphertext obtained from an affine cipher is: fmxvedkaphferbndkrxrsrefmorudsdkdvshvufedkaprkdlyevlrhhrh count the number of occurrences of the 26 ciphertext letters a b c d e f g h i j k l m 2 1 0 6 5 4 0 5 0 0 5 2 2 n o p q r s t u v w x y z 1 1 3 0 8 3 0 2 4 0 2 1 0 reaarange the ciphertext characters in the following table of decreasing number of occurences r 8 occurrences d 6 occurences e,h,k 5 occurrences f,s,v 4 occurrence Comparing with the table of frenquencies of English alphabet characters, our first guess is that r is an encryption of E and d is an encryption of T. Ok. Here are some formulas to decipher the code, but they are kinda hard to udnerstand and you need to understand Algebra really well. It kinda hard to display them in the correct diagram also since im using notepad but ill give it a try. These were gathered from various websites and programs so these arent my equations. Im not that smart. Fuck it took me months to understnad the dam equations myself. All information below this line iz copied and not my original work (didnt want to be a thief) _____________________________________________________________________________ Comparing with the table of frenquencies of English alphabet characters, our first guess is that r is an encryption of E and d is an encryption of T. If this were true, we would have EK(E) = r, EK(T) = d, or EK(4) = 17, EK(19) = 3. Recall that for affine ciphers EK(x) = ax+b mod 26 so we have 4a+b = 17 19a +b = 3 (heh, if you understand any of this shit email me and ill send u txts on deciphering more advanced keys. heh.) Our next guess is EK(E) = r, EK(T) = e. This gives EK(4) = 17, EK(19) = 4, and the corresponding system so we have 4a+b = 17 19a +b = 4 (heh, your gettin into more than u can handle aint u) The next possibility is EK(E) = r, EK(T) = h. This gives EK(4) = 17, EK(19) = 7, and the system so we have 4a+b = 17 19a +b = 7 (lol, your still reading? i hope u understand algebra. heh) The next guess is EK(E) = r, EK(T) = k, or EK(4) = 17, EK(19) = 10, and the system so we have 4a+b = 17 19a +b = 10 Solving this system gives a = 3, b = 5. Since gcd(3,26) = 1, this is an eligible pair. So we test for the key K = (3,5), use the decryption function associated with this key to decrypt the message to see if it has any sense _________________________________________________________________________________________________ Well thats it for cracking an affine cipher. Next months issue will be on Cryptoanalysis of the Substitution Cipher. If you want all the cryptoanalysis txt's then plz email me. If you dont understand algebra then plz dont try to learn cryptoanalysis, all your gonna do iz fail. -[encrypted] prokzide@charter.net ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 8 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij Outbreak Magazine - the Swimsuit Addition Text ---------------------------------------------- Xr . 78X :;;;;rrrrr;;;BM.MWMr:;r;;rrr;;;;;;;;rrrrrr;;r;;;;;;;r;;;;;rrrrrr;;;;rr;:. i7XXZBWWW 8BW.r7WMX. .. i;rrrrr.Mi MZM; 7777777777777X7r7777X777XX77XXX7X77777;i:.. r7S0MMMMMMMMMMMMMMM MM2BMWMMZMXMBBZ,iiii:iM @WM2 ;iiiiiiiiii;ii;;;;;ii;;iiiiiii. ,,rX2WMMMMMMMMMMMM@WWW@M@@WB0ZZ M0W@@MMWWB8BM ..iiiirB; .MMM ii;;;;i;iiiiii::::::,. MZMWWWMMMMMMMM@B8aX27XSS2a2XZaaZZ8ZZZBZ M@MMWBB@078@7iMM7:i;i:. M8MWM ,::,.. ,;rSSZ8W@MWMWMMMM@0MW7aaZZZZ8Z@0BBWB0B0@BBBBBBB0B8 MMMMWMMMMWMMBM@M . r: MWZM .,;2aZZB0MMMMMMMWB@@M@MMWW@ZW8080BWZMW@82aZZZZZWS2S22aZaZ22aZZaaZZZ MWMWMMW0MM0MMX i iSZ BBM@WMBMMMMMMM ZMM.BZ@MMMMMMS;0aa2a2SrZaZaZaaSMW@M888a88aZZZ800Z888000BZB0008 SaM@MMMM2ZMMMWMMBMMMMM XaM:0WSZZZaZ, MB:,8Z8@MMMMMMM0X;2a8Z8Z088ZB@MMMMMMMMMMMMMMMMWBBBWBB@WBMB@BBBB MMMMMMMMMM@80W0@88Xra@SXZB MWZ2aZ8SXMM 8B72WMWBBBWWMMMZa0WBWZ8ZWMMM0Z@8802a22aWZaSS2WZ22S2XXXXXXSaSS MMMMMMMMMB@@MMMMBWMaM007a0 M@Wa808XM0 Mrri;8BW@BW@@@W@7iXXX7ZWM SB000W0WBBWWWM00 ZWMMMMMMMMMM@@MMMMMB008Mar8WMWX2Za@a. SMMi8MMBM@@@B@@MMW8ZZ0aSM :8: :2, r i .i@ZW080W0BB088ZZ2Z WMMMMMMMMMMMMM0MZ8M7aZ2ZM8M78WS8Za0SXMW2 .rXaWMMMMWWW@@aZ00a8M S:8SMi;rrai S7 a820Z8a2aaSZXSaaZZ MMMMMMM@@MMMMMMaX722aBX:M0MSBMBaSSMZ7 7Xr;iX80@MMWBWM8XXXra@,S MSi r08aX iZ8X@8ZZZZZ8aWZ80808 MMMMMMMMMMMMMMMWM@M@0WZMXXMaWBWS2ZM,.;7rraXSBWWBZZBM@ZBMMWMMMMM . .7,rZ7 .;,.iZBSS222Xa2Z2a2aaa MMMMMMMMMMMMMMMMMMMMW@8M8ZMMWWW2Z0M iX2Z002Z008ZWMMMM@B@@Z r ... irZ2MB8a8800B80BB0B88 MMMMMMMMMMMMMBSXW@BBZZ@i,MMMZB8Xa8B;i;i ;2ZaSB0S7;r2B0Z0M : r.r; r X M MW0WB8Z0ZZZZZ88000 MMMMMMMMMMMMMMMW0aZSSXM aMBBMaXZ8.M irSB8rXSSSWMMMMWMWZMM i,:ZaM;X i7: iiSS, MM MB0BB@W0Z828Z8Z82Z MMMMMMMMMMMMMMaXWWBBZX@Z8M@8BMSa80rZ 8MMMMWB@MMMB2X0WWB80M Z .ZaMZi ,; :7 M aMW@W8BBZZ8aB2ZaZaZ MMMM27@MMMMM0MMMMM8MMSWZZ7M0W07aS7aa XMM@MMB BMMBW@W8aZZ@:M, .8S Ma2 @8 ;W0WBBZB02aZZ2ZaZZZ MMMMWMBXBaWMMaS87;7BMWXr;MMMWM0@0ZMM 0MM XM@0BW8aZZ0MB i:@ ,. i;MX0.aMM M72MWWBB0WB0Z02228SZ WMMM;rM2WM8MMMWMZaZXMMMMMi7WB@;,:aSZZXrr. @ i2Z82aZaZ0@iZ .: i,: ,7XMi. M, Ma WBWM@00W00BWSa0S2 aMMM2MM022X8MMM@MBW7XWM ,,.;MM i2S8MXWSa0BaaSaZB;8, 7 2@ S:r :7802X7XMBX.7X2BW88Z8WBB2ZaZ WMMMX:0M2SZ78MMMMMMWBM ZaBB@08a2X; , ;aBa0 0B0W@MaXS02 i27W. :8 @SXrrrr7;;Z2XBMW@MMMWaWMM@a8Z MMMMMWXSMMMMMMM72aMM8B .Xi; :,: . ; 7B@MMMMMMZaZX2WM r r;7777XrXr08002r;,SMMM@0MMMW2 8MMM@BMWMM2, i; XrrSBZX X82SBW808aaBBMMMMMMMMMMMMMZrZ7 irXrX72X: ;S;:72Z;i. @WM@@XMMZ 7,SWBZ . . :7MMM: r2,iX. X2r Z2SX2Z08W@BWM;SWMWWWMMMMMMM2 .;irX7M,MMX2rMMMMMMMMMMM @MMMMMM i;ZSSii; ZaZ82SMBB .i;:; ,... ;28SXra8ZZ00WW@MM.7ZMBBBWWBBW@MMMMMMZ27M M@i2XaXr, S@BBa @MMMMMM@ 7.2 ii::...: i:,:.rXB@080ZZ00W@@M@M 78M000B0BWBBBBM, ,XZSMZMM20WMMMMB7i ,: MMMMZi:i:2a2:ir,r;ara0@20a. :;, ,i. .:, ,.i:XZ@@M08B@@MW00M XSMZZZ0080088ZZM282rM 0M :.;S::: Z , B:rrX, .;7rii:i .,,ir: .;r 2MM@W8Z2ZWBia;M8Z888ZaZaa2aB7 M ;i @Z 2Zaa2S7Xa,.;r.,:7rr2 :SSXXS;,.: .i:i;;:,ZX. 0MW0880WM:2Z.MB8ZZZaaaZaZZ0WMMMMWZWW0MMMMMMMMMMMMM ,rMMM8aX77 .ia;SSSSX:.,. 7,.,::,:,... ZMMWWWM@,ZZ:WMB0088ZZZZZZ8ZBMWMMW@MMMMM@@r 0M8MMMMMMrXr77i,.: . rrii;r;r7i i :MMMM@,aZZ2:M@W00008ZZZZZ2MMMMMMMMMM@S. ,, ... ... . :X;r;,,, 7Srrriii.r:i 7MM7ZZaZarrM@WWB00ZZZZZ@i;;i. ...... .. ... 8rS;,, :rrii;8Z;7; ZMMWW80r7M@WWaW0ZZZZM ;;.. .. .. ............ ..... .... Z;8;, . . .2MMWZSiBBa8W0ZZZZMr .. .,: .,,,,.,. ,.........,.,.,. ...... rrBa . ... Z@ZS:r8MB088ZZWM ......... ....,,.. ....,,..... ,....,..... . 8Wr . ...., .ZM8;WM88ZZZZ0M ...,....... ....,.. ......,,,,., . . . @ .. . ..,::. i8ZrZ000ZZ88Mr ...........,....... ...... . . .. .... . .. ..,,,.,::,.SZXWW08ZZ0WM . ........ . .. ..,,.... ....... ....., ..:, . .... . ,::r8X0WZ88ZZ0M ... ....... . ...... ,....... .. .: ... .:i,r88S:M088ZZZ@S . ....... .. ,. , . ... . .,:. ..,,,iX.. . ....,.,ii;7rrXaZZ8 2WZZaaZ0M@ .... ...... ; ,.:. ... . . .iXi:., .,,,:i;;.,:..,, ,.,.,,irr2aaa00ZaZ; M08Z80BWMM .... ...... 8MM0. :i, .. ...i ;; XXS7::,::77. ... .,. .,:,iiXS28Z8M@82SB. rMW0BBWWWMM .... ... ... SMMM0; .,i,.,.. i iXSMMXX7r;;X22;rrrr;;;i:,.:i:;i22Zr ZB80SZW 8M@BWB0BWMM . . , ...... 0M7i ZWMM@7 .. . 20.:rXa2S22XZa8a77;riii;iii::;irraZWW@BW822W . 0MWB0BBBWMM .. . ..... 28MMSi BBMMM0, ., ,;7@S;2ZZ88Z2aS77XXSSX7777r777S2a2aaZZ8a2XaB. . 8M@008BB@MS . ...., ... : . i0Mar i iMMMM@; ;i;2M i;iii;rrr777XX7XXXXXXSX7XXXXXXrXrX8X ,.. 8MM8000WMM , . . .. .,:.,:. ,aMWX, i2MMMBrr72M .;S7r77777X7XXX777777777rrr;r;;7Z, .... . :MMWBBBWMM . :,;..:r; :aWMMX, irrX0Z ,.:SX77XX7XX77XXXXXXXX777777rr7a2 . ..,:.,. MM@0WW@MM,XWMMBa .. ,;i;r.,r;i; ;2MMZ7X: iX0M i,,iXSXX7X7X7X7X7X77777r7777XXW . . . ... aMMBBBMMM ;BMX:. .:;: :, 7;,:i. ;ZMMX;ZW . i;;72SX777X777XX7XX7XXX77rSB :.. . ..., MMWWWMMB :. ,i:7,:::,,,i;ii,, iXM :, :7X7X7X7XXXXX7XXX7X7XXZX ,. aM@B@MMr ,.., i ;.7r.; iii:i:,, X8 ;, . i;7XX7X7XXXXXXXXXXXXXXB: 00BBMMX2W8a002 iXi,X : ,:,: ,.,,;,:, Zi .i;r.. .7X7777X7XXXXXXXXXXX7X7W. :i MMMMMMMMMMMMMMMMMBZZ0BMMWMMMMMM .,,ir77i i .,,, :i,.;: iS . :: .7SXXXXXSXXXXXXXXXXXXXX7M : ;@Sa80W@@MWBZ0000BWBZa0WMMBa0800 ;.i. :X ,:;iii:. ;S;M0 .XXXXrXXX;7rSa2XXXXXXXX7XXM : XMW0a2B0X7S28B@MWBBB0WBa0W@MMMBWW ii;,,;.:: i:::: i7i.,r7 a70aW.S: :r222aZ08SXrXX;7SZZ2SSXXXX7rS M82802B0ZaWSSZBBZ0BW@WW0ZBMMMMMMZ . . :Xr ,S i ;i :; . iSS:ir7M MM@8X, . .;Saa22SXXaMMM7MZ8Z8Z80Z8MZ28WBXSa0WBMMMZM iMM ..rXX ,Xi r ii;; ,;,, ;S:W:8 Mi:a0Z8882Xaari;;i:: ..::.r 0WMMM0ZZ8888B8ZZBa222S7XSZWZM ,WM 7 ; ;i:, : : .,:: i.XS MX MMS .aS7X2ZWMMMMMMMMMMMMMM@008;22M. X .i2@@0ZSSa88888088882SXX7SWS XMM X;;;i; .S Xi.:;rr,.;2;:;MS M8WM8Z28WWB8aZSZaaZa8ZZaaZBWMBMMMZB.r0 ZW0BMMM82S2aZZ888000ZaX8W8W ;rr. :X X7: :i,.;,:7BWX@0002BMM.;ZM@@0a2SaZBBMWMMXZMSWWMSBB02 .M0WB00WW@MW8a2a88aZaa08B0XW X2; ::r ..,7 : i7..;:i:,.S.;r2BB8aZ80 .i .:2MMMMMaS;:M8Z82 MWMM2:MMMBMZB080BW0BW@WBZS72ZZZ288ZZZB 8M X ; SX;rrir X..i.. .r8.i728WWWB0WMSB0S:r2Xr.;2; , ,7Z280M8ZWM ,MMMWW88B@W08BBBBM@ZSSa20ZSZZM S . . ;;rii i.i:, iB X:,;XSaZ8BWWMMB0MaMMMM@ .. iZW8880B@WMWM.. ; :,ZMMM@8WZaMM8MBWWB@BZaZZZ8ZM, . ,i ri7 : :,.;,:.rMMr0W ;7SSZZZ80B@MM2 XXZaZMa@MB08800BWWM@M@2 ,8r7ri.S0MMMW00ZMM0M@WM0WWZrSa@Z a;;7:r..;, : ..MMM M i;XXaZ88Z000WMMM; aBWBWWBBBBWB@WWWWWMM S2rZSSSX77ii28MMMM0ZXWW8M@8B@@@a2@ . ,7S,i:i; ,:i27; .BMM M@.rSX2Z8BB00088BMMM M@BWWWWWBBWWWW@@W@Mi .r8SSXXSaX2X::r8MM@BB02@WZW@W@@MM i,i.a:i.r7;XSr: ;i MM7SXSaaZB0000000BMM MBB@MMMMMMMMMMWWW@MM aSSSS2SXSSXX;;,;BMMMZaS2WBaB0@MMM :, X iri.. .;,.,r: . SSS22Z08080WW@WB8B@MMMB87, ,iaWMMMWM 2a8SSXXXS22SSS277r;iSWMMMMBW0MB8ZWW ii,...;. .. i,,, ir2:,:;, ;Xa2Z8WW@WWB8Z2ZBM8S @ ,irXrr77S8@MMX 7Z2XSXXS2SSS2aSXXX7;,,20MM@0a88B8Z .,: : :, ,;: ,:i:,.,, X8aSSS7XXXaZ0B0MMB.W.r;;;;;r;XX28@M0M 7SXXXXXXXSSSXSSXSSX77i:,2MMMMBMMB . ;r.:.,i., , ;.. ,2;;, ;: .ZZSZ8888880MM0M2SXSSSS7r7rXS2aaaSM i;SS72SXSXXXXSS2SX22XXSSX:. aMM@Ma :;.,. .. :. ., ,,;ir,,X:;i,:;.r8ar;XB8Z0MWBB@8iiaa727XX2SX22Z2B@WiXSXXXXSSXXXX77XSSSXXSSS22S7; i0MM :: ,., ..7..,X;; :i.Xr;7X; .: :00X2280ZaBZMMX8S,a;2XSSXa2SZ288M aaaZ2SXXaZ82XSSXXXSSXSXXXSXSXSi .X,;.i,,:,.,i;,., :.. ,r:..:;.,7: riZ2S8 8 iS8riZ0,S777S7Z22S8Z@riX28BZ27X.202XXXXXSXSSSXXXSSZi ,: :. .,. .,,,,,. ;i..:r,i ...:;iirra@X2ZZ2a0Z@,SrW272:8;ZZ@XaaZZZ2ZWW:SX22Za80Z:72ZaSXXSSSSSS2XS2:.rr; ::i.r; :,...,,,i . ,,:., ;i i.. rXX8Z8ZSZM;S0ara8M;i: M2SaS28ZZSrSXXSS2a8BBaX;XaSXXXXSXXX7XZ,X; i , , ..::,., i. : ;,. i;i.;;r. rX:8@8Z02aSZZ8i8 7X i XZ7 S;280aaa8W;X2XXa2Z888BB82XS2SXXSSSaaZB;7X,: : . . ,,:.:,..i,., ii,,,: .::, S 7SSSZ87r 2S72XaXr@Wrri2iXaZaZa:XSX222ZZZ2aZaZB822S2SSXX .7 i r: X: ii:ii .:. .:,i i. ,ii,r,,,S ;Xa2M; :;.7raSiZZ0BZXa@2ZaZZ7SX7a2aZaaZZ2S22ZZZZ2XrXaa7;.Xi7a : ....:. r; .:::,r.i ..i..i ..:.:i:;Bar 8M :, i2aX7SB82 7XZaZaXXXXaaZaZ8ZZZ88ZZa27X22r;r;.iri : ai: ,:;;i: i.,: . :ii :i,;:::i,.,. Z88B8M0 i8rr:, ;ii;7800ZZZaSXS222aZ88ZZa2ZZZaZBW@08Zaa2;,::iiX iir, i, :i. .8 , .X,.rr;,,.ii.,..:;.8ZXXSZ r; , i2Xa2S2ZZSa22aX22aaaZ8ZZZZZaZZ0ZSai;Z8r72:Sr: 7, :, .::i iii.,.;rr,rX,:, , i,.; 7;:,28Z0S i:iSrWS;rXr2S22a22aSSaa88ZZaaZZaZ008B, ,, . .7aZ.:i .,.;7iX7XXa:XZa7i :. .i2XXri7ia:.i;rrirX,XBM MirZXaaX8ZZ2222222a888ZZ2ZZ8ZZ88WBai.;;., ; ,. ; ;SX, .: , iXrrX. . iXi iX;7 r..72;, , .X iXraa7.0ar::82S222aaZZ08BZ2aaaZZ8ZZZZa8BWM . ;8@rX.77a,7.Zrr 7r r: i ;i, X: ,: .i:rX . , . . S;,:ir,r X0ZaXZZ8a88822S.iZ882Zaa88ZZ0WMair ;rS,2r:i.;X,a, . Sr ,i;:,;: :.r:i:,,:i; 7:r .:,,.;:. ; ;;SaaZS 7ZaaXr7:,7:.: , , 2aZZaZaZZa. .7. 8,..iXi;r . :iZ.Zi ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 9 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij ###################################################################### ## a sign of weakness. -dropcode ## ###################################################################### ---------------------------------------------------------------------- "a firm handshake shows strength in character. a feeble handshake is a sign of weakness." ---------------------------------------------------------------------- the connection initiation process most commonly associated with internet communication channeling is known as the threeway handshake and is a standard of the transmition control protocol [TCP]. in this article we will look at a mock threeway handshake in detail, explain the different types of data exchanged during the process and discuss potential weaknesses in the protocol. ---------------------------------------------------------------------- the operative mechanism of the tcp protocol is a means of transmitting data over a communication channel between two machines without any physical connection. the means instated by the tcp standard is a complex system of parsing data into packets of a fixed size and routing them through a long string of systems to there destination. each packet has 'flag bits' which can be set or unset. set bits express the function of the packet. for instance, the purpose of a packet with the synchronize [SYN] bit set is to initiate a connection, whereas the purpose of a packet with the finish [FIN] bit set is to terminate an existing connection. the threeway handshake is a simple exchange of three packets between the client and the server. there are three basic steps to the handshake. figure 1.0 below illustrates a basic representation of the three steps in sequence.
:: ________ ________ :: | |----->>----SYN---->>-----| | :: | client |-----<<--SYN/ACK--<<-----| server | :: |________|----->>----ACK---->>-----|________| ::
Step 1: the client begins the handshake by sending a packet with the SYN bit set to the server signifying that it wants to initiate a connection. Step 2: the server recieves the SYN packet and returns a packet with both the SYN and ACK bits set signifying that it accepts the connection request. Step 3: the client completes the handshake by sending an ACK packet, a packet with the ACK bit set. client applications are assigned a port to use in connecting to a server. generally client ports are between 1024 and 65535. this is called the ephemeral or client range. servers (or daemons for *nix/*nux'ers) are also assigned a port. where clients use there port to connect to a remote server, a server uses its assigned port to listen for connection requests. servers listen on ports in the service range, between 1 and 1023. lets say the client in figure 1.0 is a web browser and is attempting to view a webpage hosted by the server. a more elaborate diagram will give a better representation of the process.
:: ____________ ____________ :: | client | .->-SYN->-. | server | :: | .--|----' | | | :: |1024 | |-<-SYN/ACK-<-. | | | :: | to '--|----. | | | | :: |65535 | | | | | | :: |____________| | | | |____________| :: | | | | '----|--. | :: | | | '------|80| 1-1023 | :: | | '--->-ACK->----|--' | :: |____________| |____________| ::
the SYN packet leaves the client system from a port in the ephemeral range and reaches the server system on the standard service port for http, 80. the serving system is running an http server (httpd) that is listening on port 80 so, it recieves the connection request and responds with a SYN/ACK. the client recieves that and returns an ACK to finish the handshake. blamo. ---------------------------------------------------------------------- an important aspect of the threeway handshake was left out in the examples above for simplicities sake. when the server recieves a SYN packet and returns a SYN/ACK it also allocates memory reserved for connections called connection resources. this is a cause for concern because an attacker with access to raw sockets on his local machine can manipulate the source address of the SYN packet which would result in the following. Step 1: the attacker sends a 'spoofed' SYN packet. this means the source address of the packet has been altered, usually to a random address. the 'source address' is the address of the client machine and the only way the serving machine knows where to send the SYN/ACK. Step 2: the server recieves the SYN packet. it allocates connection resources for buffers and other connection management purposes and sends a SYN/ACK to the spoofed address. the connection is now 'half-open' and will remain in this state until it recieves an ACK packet, the connection terminates, or the servers waiting state times out. Step 3: if the spoofed address is an existing address with a working machine, that machine will reply with an RST signifying that it never requested a connection. But if there is no machine at the spoofed address the packet will be discarded. after a short time the server will assume that the SYN/ACK got lost or dropped on the way and resend it. Step 4: back to step 1. the second SYN packet will cause the server to allocate more connection resources. if the attacker sends enough SYN's to force the server to allocate all available connection resources before the first half-open connection times out, the server will have no way to accept any more connections. even the valid ones. it is also possible to bombard multiple machines with SYN packets all spoofed to the same address. this will result in the machine at the fraudulent address getting flooded with SYN/ACKS from multiple machines of your choice. often the vicims logs will show them being flooded by government or big corporation networks. *smirk* when a SYN packet is sent it contains, in its header, an ISN or initial sequence number. the SYN/ACK packet the server responds with conntains the servers ISN. every packet thereafter contains psuedo- randomly generated sequence numbers determined by the two ISN's exchanged. if the connection between the client and server can be sniffed it is possible for an attacker to 'highjack' a tcp session by injecting spoofed packets with the expected sequence numbers. Mitnick used this attack, intermingled with the SYN flood explained earlier in his well known attacks on Shimomura. also, if a tcp session between a server and a trusted client is sniffed by an attacker, the attacker can often 'replay' the initiation part of the session to create a trusted connection between himself and the server. ---------------------------------------------------------------------- well, thats about all the formalized bitching i can do in one phile. if you have any questions email me at uberego@hotmail.com greets: lexi, jenniebean, ramb0x, gr3p, kleptic, ex3mecut3 an digi. thats it. thats all. bleh. if you're not on this list, you obviously havn't shown me enough love. *taps toes* i'm waiting ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 10 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij Getting Free Linux Distros. --------------------------- By Turbanator (turbanator2k2@roy.phonelosers.org) OK say you want to get the latest distro of linux but dont want to put out the cash, heres a simple yet suprisingly stupid method. First go to http://www.bn.com and search for the For Dummies book that contains CD's with the latest linux distro book, i.e. Red Hat Linux X For Dummies. Then once the product informations page comes up check under the price for the ISBN number. Take that number and copy & paste it to a notepad. Head over to your email and compse a message to techsupdum@hungryminds.com, include your name shipping address, ISBN number, and the name of the book, and a lame excuse like "my dog ate the CD's". And there ya go, free linux distro. This can also work for any book that comes with a CD but I decided to use Linux as an example. Any questions can be directed to me at: turbanator2k2@roy.phonelosers.org and on AIM: Turbanator2k2 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 11 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij "The anTrojan Filez 4" by Timeless -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= "Host and Virus" - a new style of art! -------------------------------------- I am a programmer, and yet also an artist! A lot of people might consider this combination an odd one. I don't know any different, and I know I'm not too bad at both of them. Being a programmer and having studied computer viruses (virii), I decided to make up some art that depicts a virus inside it's host. Naturally, I tried the normal "blob cartoon virus" approach, and it was terrible. So a bit more thought led me to discover a very unique style of art. Please forgive the ASCII art, but this is a non-graphical e-zine. Here is a very over-simplified "Host and Virus" style picture (half close your eyes and stand back for a better view): @@@@@@@@ @@@@@....@@@@ @@@@@@.......@@@@@ @@@@@@@@..........@@@ @@@@@@.....@@@@.....@@@ @@@@........@@@@@@@....@@ @@@@.........@@@ @@....@@ @@@....@@....@@@ @@....@@ @@@@@@@ @@....@@@@....@@@@@@....@@ @@@@@@@@@@@ @@...@@@@@.....@@@@@....@@@@@@......@@@ @@@@...@@@@@@@.....@@@....@@...........@@@ @@@...@@@ @@@@....@@@....@@............@@ @@@....@@@ @@@....@@@....@@............@@ @@@ @@@.....@@@ @@@@..@@@....@@.@@@@@@@....@@ @@@@@@@@@@@@@@.....@@@ @@@@@@@@....@@@@@@@@@.....@@ @@@@...@@@@@@.....@@@@@ @@@...@@@@@@@@.......@@ @@@.....@@.......@@@@ @@@@@@@@@@@..........@@ @@@............@@@@@ @@@@@@@@@@@@@@@@@@.............@@@ @@@..@@@@@@....@@@@ @@@@@@@@@@@@@@@@@.........@@....@@@@ @@@..@@@@@@@...@@ @@@...................@@@@@@@@.....@@@ @@...@@@ @@...@@ @@@@@@@.................@@@@@@@@@@@@....@@@@ @@...@@@ @@...@@@@@@@@@@...............@@@@@@@@@ @@@@..@@@@@ @@@..@@@@@@@...@@@@@........@@@@@@@@@@@@@@@@...@@@ @@@@...@@@ @@@@....@@@@..@@@@.........@@@@@ @@@@@@ @@@....@@@ @@@...@@@ @@@@....@@@@.@@......@@@@@@@@ @@.....@@ @@@...@@@ @@@@....@@@@@.....@@@@@@@ @@@@@@@ @@.....@@@@@@ @@@...@@@ @@@@@.....@@.....@@ @@@@@@@@@@@@ @@@.......@@@@@@@@@...@@@ @@@.@@@@...@@.....@@ @@@////////@@@@@....................@@@ @@@..@@@@@@@......@@ @@@//////////@@@@@..@@@@@............@@ @@@...@@@@........@@@ @@@//////////////@@@@@@@@@@@@@.......@@@ @@@....@.........@@@@@@@////@@@@/////////@@@@@@@@@@@@......@@@ @@@.............@@@@@@@///@@@@@@@@@@///////@@@@@@@ @@@.....@@@ @@.........@@@@@@@@@@////@@@ @@@@@@@@@////////@@@@@@@@....@@@ @@@@@ @@.......@@@@@@@...@@///@@@ @@@...@@@@/////////@@@@@@@...@@@@@@@@@@@ @@@@@...@@@@ @@@...@@@/@@@@ @@@..@@@@@@@@@@////////@@@...@@@@@////@@ @@@...@@@@@@@@...@@@/@@ @@@...@@@ @@@@@@@@//////@@@...@@@/////@@@ @@@@ @@...@@@@@@@@....@@@@@ @@@....@@ @@@@@@@@@@@....@@@/////@@@ @@@@@@@ @@@@@@@@@//@@....@@@@ @@@.....@@ @@@@@@@@@....@@@////@@@@ @@///@@@@@@@@@@/////@@.....@@@@@@@@.....@@@@@ @@@....@@@///@@@@@ @@///////@@/////////@@@...................@@@@@ @@@....@@@@@@@@@@ @@///////////////////@@@....................@@@@@@ @@@...@@@ @@@//////////////////@@@@@...........@@@......@@@@@@ @@@@...@@@ @@@@@@/////////////@@@@@@@........@@@@@@@@@......@@@@@@....@@@ @@@@@@@@@@@@@@@@@@@ @@@@....@@@@@@@ @@@@@@@.....@@@....@@@ @@@@@@@@@@@@@@ @@.....@@@@ @@@@@@..@@@....@@@@ @@@...@@@ @@@....@@@@ @@@@@@@....@@@@@@ @@@....@@@@@@.....@@ @@@@@....@@@@@@ @@@....@@@@......@@@@@ @@@@...@@@..@@@ @@@@..............@@@@@ @@@@@....@@@....@@@ @@@@.......@@.......@@@@@@@@@@@@@@@.....@@@@@...@@@ @@@@@@@@@@@@@.......@@@@@@@@@@@@......@@@@@@....@@ @@@@@@@@@@@@@......................@@@@ @@@...@@ @@@@................@@@@@@@ @@@...@@ @@@@.............@@@@@@@ @@@...@@ @@@@@...........@@@ @@@@...@@ @@@@@@@@@......@@@@@@@@@@@@....@@ @@@@.....@@@@@.........@@@ @@@.................@@@ @@@@@@@..........@@@@ @@@@@@@@@@@@@@@@@@@ @@@@@@@@@@@@ You will see that the host is generally a very complicated structure, and the virus is a small, entangled structure sitting within the host, yet not actually connected to it in any way. This is the basis for this "Host and Virus" style of art. The artist should strive to make the host and the entangled virus as complicated and as big as the canvas will possibly allow. Generally adhering to circular or symmetric "biological" shapes for the entire entanglement. The host and virus should be made up of strands, connecting, diverging and weaving. In the example above the virus is only a single strand, yet the weaving serves to obscure it's presence. In a much larger and more complicated "Host and Virus" painting, the artist might experiment with shades of colours to either highlight the virus or to confuse the viewer and try to hide it completely. In the above example two colours were used, the lighter depicting the host, and the darker depicting the virus. This was done on purpose so that you would immediately see the virus as being separate. Try search and replace the slashes for full stops and it may not be so obvious anymore. This use of colour best explains how computer viruses either hide themselves or outwardly seek the attention of the user. The complexity of the structures tries to show the viewer the complexity of the software involved (both virus and host). The above picture depicts a simple host program infected with a very simple piece of virus code. The next piece to this kind of art is "the backdrop". This is what you will see behind the structures in the background. The backdrop is used to set the mood of the painting. The artist can do all kinds of things like rays, clouds or even lightning effects. However, the backdrop should always be less prominent than the actual subject matter - the "Host and Virus" themselves. Another good idea is to make the virus white in colour and the host slightly off white, cream or even grey. Then you shine an ultraviolet lamp at the artwork and only the virus' structure will glow. So, get up and do something "arty" for a change and decorate the whole wall of your computer room with a "Host and Virus" artwork (please ask permission first! - I don't want any comebacks from this suggestion). You might also like to doodle these inbetween classes to impress your mates, and challenge them to find the virus. Very complicated ones should be much harder to spot in the mass of entangled threads. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= And so it continues, as your mind gets infected by the anTrojan filez. Greetz to all at #outbreakzine and #hackerzlair on DalNet. - Timeless ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #5 - Page 12 of 13 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij - - - - - - - - - - - - - - - - - - - - - - - - - - Step by Step (SxS) switching notes by: antimatt3r on: 4/29/02 for: Issue 5 - - - - - - - - - - - - - - - - - - - - - - - - - - The information provided below was conducted on a class 5 step by step switching sytem. The topics/methods described in the following may not work on your switching system and also may have no practical use, but are being exposed to the public simply becaise knowledge is power. This text is for those of you who know about switching and telefone system architcture, meaning dont come to me asking what this and that means.... read a bewk =) Step by step switching (I would say) is rare. On most occasions it will be only in use in very rural areas w/o digital equipment. Everyday electromechanical SxS systems are being replaced with electronic/digital switches and Remote Switching Systems (RSSs). SO if your in the middle of nowhere give this sh!t a try..... Toll/Operator Assisted Dialing Most likley you can dial 1/0+ numbers with your prefix included in most areas. You can dial any call that you could normally reach by dialing 1+ or 0+. Example; to dial an operator assisted call to a number in Chicago, you would dial NXX+0312+555+1000 where NXXX is your prefix, and you would recieve the TSPS bong tone, and the number you dialed (312 555 1000) would show up on the TSPS console readout board. You can also use a 1 in the place of the 0 in the above example to put the call thru as a normal toll call. Sorry for you folks that think that this bypasses billing, it dosent in any way. The actual reason that this works that the thousandths digit in many SxS offices determines the type of call. A 0 or a 1 in place of another number (which would represent a local call) is handled accordingly. Another reason is due to a DAS that can be installed in some SxS offices to 'absorb' the prefix on intraoffice calls when its not needed to process the call. A DAS can absorb either two or three digits, depending on weather the CO needs any prefix digit(s) for intraoffice call execution. Hunting Prefixes SxS switches may also translate an improperly dialed local call and send it to the right area over intraoffice trunks. Example; you need locally call 492 1000. You could dial 292 1000 and reach the same number, provided there is no 292 prefix within your local calling area. However, only the first digit of a prefix may be modified or the call will not go through correctly unless you happened to dial a valid local prefix. You also cannot use a 1 or a 0 in place of the first digit in the prefix. If you should, the switch would interpret that as either dialing a toll or operator assisted call. ONI / ANI Fail To get this you must have basic knowledge on how ANI functions on the SxS system. ONI stands for Operator Number Identification. Your CO sends ANI with you number, in MF or DP toreceivers that recieve (duh) the ANI information and display (and\or) store it with the called number If it is stored, (almost always) it is stored in the form of AMA tape. ANI outpulsing in MF can use either Local Automatic Message Accounting (LAMA) or Centralized Automatic Message Accounting (CAMA). ANI sent in DP type signalling is rare. DP vs. MF type signalling is like comparing DTMF to pulse dialing. On a trunk DP sends all information in short bursts of 2600hz tones. Triggering ANIF's/ONI is an easy task on SxS (and some versions of xbar) because the customers link to the CO allows the input of MF tones to infulence a calls completion. This can be accomplished by dialing a long distance number, then listening to the click that follow. After the first click (after dialing) you will hear a few more usually timed very close to one another. The final click always happens right before the called fone rings. The number and speed of clicks usually varies.The click are the toll office that serves your CO setting up a route for your call. In order to 'exploit' this you will need a MF source. It could be a recording, blue box, good sound card or anything else you can come up with. Soon before you hear the clicks, send the sequence KP+1 (repeatedly) for ANIF or KP+2 (repeatedly) for ONI. This will NOT work if your CO uses DP signalling. Play the tones into the fone at a sufficent volume to overpower the clicks. The MF squences must be sent quickly for this to work correctly. After you have played your 'routing' a few times you should hear a TSPS op. S/he will want to know the number you are calling from. (When ANIF is recognised the call is sent to a TSPS site for the area. You can give the op any number in your exchange and s/he will enter the billing information manually. then put your call through. The charges for your call will be billed to the number you gave as yours. Another method to do this is just to click the switchhook during the clicks. This sends DC pulses that scramble ANI outpulsing and cause the call to be directed to a TSPS site before dialing the number. This method should be used sparingly and with caution. Hopefully you would gather that its not advisable to use the same number to bill the calls to often. If you should do this (to someone like thuglife32 (4747631)) the toll office report will list the number of ANIFs in a period of time. The ONI method works better because it is gathered that ONI is needed to identify a callers DN upon a multi-party line. Too many ANIFs generated a report on a security/maintenence TTY, so if you use this method, use ONI more than just ANIFs. The idea of ANIF is to scramble your ANI info by using MF (or the switchhook) to send your long distance call to a TSPS op for ONI due to ANIF. The idea behind ONI is that you are making them think that youre calling from a multi-party line and ONIis needed to identify your DN. Test Numbers Some interesting features in the step switching network can be found by dialing test numbers. Test numbers in SxS switching are usually hidden in the xx99 area, as opposed to 99xx which is common for other types of switching areas/systems. These types of numbers are possibly physical limitations of a SxS switch, and thus a milliwatt tone or other test numbers may be placed there because a normal DN cant be assigned to such a number. However, these xx99 numbers are usually listed in COSMOS as test numbers. Another interseting note about xx99 numbers is that they seem (in some offices) to be on the same circut. (if one person calls a xx99 number and gets the test tone, and another person dials any other xx99 number they will get a busy signal) DIaling your prefix followed by an xx99 may result in a busy signal test numbet, a network overflow (recorder), milliwatt tones, or some other type of message encountered when dialing. Although not every xx99 is a test number, many are. The numbers that return busy signals are the ones that incoming callers are connected to when then sleeve lead of the called number is in a voltage present state, which is when the line is in use or off hook. Busy Signal Confing This really sucks, and its a easy, but annoying way to conf. Imagine you call up a number and you get a busy signal, then someone says, "hey whats up". What the hell? Well, another interesting feature on the SxS switching system is the way busy signals are generated. In ESS and DMS COs, busy signals that are sent by the terminating switch are computer generated and sound very even and clear with no signal irregularity. In SxS, all calls to a particular DN are sent the same busy signal termination number, which can usually be reached by a POTS number. These busy tones arent computer generated and the voice path is not cut off. You can exploit this and have a busy signal confrence. Several people dial the same busy DN that is served by a step office, or they can dial the always busy termination number. When the people are connected to the number you can hear them talking. (over the damn 60 IPM tone that is) One bonus of this is that answering supervision is not returned on busy numbers and thus the call is toll free for all parties calling. You must be using AT&T as your inter-LATA carrier if the call to the busy number is an inter-LATA number for you. So if you have sprint you must first dial the AT&T carrier acess code (10ATT) before the busy number. If your LC dosent detect answer supervision, and beings billing immediatley or after a certain amount of time, then you are billed for the length of the call. Geez, just go get a damn raindance eh?!? Temporarily Freezing a Line On a SxS system that runs on the direct control idea, which controlled directly by what the subscriber dials, it is possible to jam a line to prevent service by flashing the switchhook several times. Another way to temporarily freeze a line is several aborted dialing attempts, this makes the line freeze untill the line is manually reset, or if theres some sort of timeout mechanism. Usually when you do this the line will only be out of service for a few minutes. The line shows the same characteristics as if you busyed someone out, the line is busy to callers, and the line seems dead for the victim. This is what happens when an element is jammed. The switch itself consists of a linefinder, which sends a dialtone to the customer who picked their fone up, and puts voltage on the sleeve lead to mark the given DN busy. Next are the selectors, which recieve the digits dialed and move accordingly. The last step in the switch is the connector, which connects the calls (no shit eh?) that are intraoffice, and sends calls to a toll office when necessary. Other types of devices can be used where needed. (such as Digit Absorbing Sensors (DAS)) Trunks The SxS system incoming and outgoing trunks are very likley to use in-band supervisory signalling. This should tell you that you could possibly use numbers served by a SxS CO to blue box off of. Some older step areas may not use MF signalling, but DP signalling. DP signalling (if you recall) uses short busrts of 2600Hz to transfer information as opposed to MF tones. In DP signalling, there are no KP or ST equivalents. Boxing may be accomplished from DP trunks by sending short bursts of 2600Hz (2 bursts = the number 2). Usable rates are 7.5 to 12 pulses per second, a digit might be around .04 seconds of tone and .06 seconds of silence. DP is rare today, but some direct-control step offices may still use it. Common control step offices are more likely to use MF trunk signalling. Refrences: Basic Telephone Switching Systems - By: David Tally No.1 AMARC-Bell System Tech. Journal _______________________________________________________________ |______________________________________________________________ | || || || ___ _ ____ _ || || / _ \ _ _| |_| __ ) _ __ ___ __ _| | _ || || | | | | | | | __| _ \| '__/ _ \/ _` | |/ / || || | |_| | |_| | |_| |_) | | | __/ (_| | < || || \___/ \__,_|\__|____/|_| \___|\__,_|_|\_\ || || || ||_____--------------------------------------------------______|| |_______/-----------------------------------------------\_______| ___ _ _ | __(_)_ _ __ _| | | _|| | ' \/ _` | | __ |_| |_|_||_\__,_|_| \ \ / /__ _ _ __| |___ \ \/\/ / _ \ '_/ _` (_-< \_/\_/\___/_| \__,_/__/ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ PUT THE WORDS IN HERE: We've received a lot of positive comments about Outbreak. Thanks to everyone who has been helping us out. Thanks to all that linked to the Outbreak site on their site. If you want to exchange links with us, e-mail us your website and we'll exchange. Write some articles! Send us your texts. Outbreak stays alive by readers submitting articles. The more the better. We read everything that is sent to us. So get off your ass and write something! If you do girls will like you and want to do naughty things with you. Trust us, it worked for dropcode. Send all texts to: kleptic@outbreakzine.net Hope you all enjoyed #5! - Outbreak Staff ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ++++++++++++++++++++++++++WATCH THIS SPACE++++++++++++++++++++++ ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ -°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°ð-|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°- +-+-+-+-+-+-+-+-+ ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij Outbreak Contents may not be used with out express written permission By the Editor - kleptic@outbreakzine.net COPYRIGHT©® 2002.